Your message dated Tue, 12 Apr 2005 03:17:20 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#302692: fixed in gnupg2 1.9.15-6
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Apr 2005 11:38:03 +0000
>From [EMAIL PROTECTED] Sat Apr 02 03:38:03 2005
Return-path: <[EMAIL PROTECTED]>
Received: from leibniz.math.fu-berlin.de (math.fu-berlin.de) [160.45.40.10]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DHgx0-0002xa-00; Sat, 02 Apr 2005 03:38:03 -0800
Received: (qmail 24706 invoked from network); 2 Apr 2005 13:38:00 +0200
Received: from lusin.mi.fu-berlin.de (HELO mi.fu-berlin.de) (160.45.113.91)
by leibniz.math.fu-berlin.de with SMTP; 2 Apr 2005 13:38:00 +0200
Received: (qmail 18191 invoked by uid 9804); 2 Apr 2005 13:38:00 +0200
Received: from localhost (HELO mi.fu-berlin.de) (127.0.0.1)
by localhost with SMTP; 2 Apr 2005 13:37:58 +0200
Received: (qmail 18169 invoked by uid 9804); 2 Apr 2005 13:37:58 +0200
Received: from leibniz.math.fu-berlin.de (HELO math.fu-berlin.de) (160.45.40.10)
by lusin.mi.fu-berlin.de with SMTP; 2 Apr 2005 13:37:58 +0200
Received: (Qmail 24675 invoked from network); 2 Apr 2005 13:37:58 +0200
Received: From telnet.mi.fu-berlin.de (HELO ?127.0.0.1?) (160.45.45.10)
by leibniz.math.fu-berlin.de with SMTP; 2 Apr 2005 11:37:58 -0000
X-Envelope-Sender: [EMAIL PROTECTED]
X-Virus-Scanned: by AMaViS 0.3.12pre7-L31[18173]([EMAIL PROTECTED])
X-Remote-IP: 160.45.45.10
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Georg Wittenburg <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: gnupg-agent: Don't use (undocumented) max-cache-ttl switch
X-Mailer: reportbug 3.8
Date: Sat, 02 Apr 2005 13:37:57 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Package: gnupg-agent
Version: 1.9.15-5
Severity: normal
Hi!
If one wants to set default-cache-ttl to a large value, e.g. one day the
line "default-cache-ttl 86400" in ~/.gnupg/gpg-agent.conf alone doesn't
do the trick, but one also must add "max-cache-ttl 86400". This later
parameter is undocumented and confusing and should be removed, i.e.
one should be able to set large values directly by just default-cache-ttl.
Thanks!
Georg
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (990, 'testing'), (300, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-gw2
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages gnupg-agent depends on:
ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an
ii libgcrypt11 1.2.0-4 LGPL Crypto library - runtime libr
ii libgpg-error0 1.0-1 library for common error values an
ii libpth2 2.0.1-2 The GNU Portable Threads
ii zlib1g 1:1.2.2-3 compression library - runtime
-- no debconf information
---------------------------------------
Received: (at 302692-close) by bugs.debian.org; 12 Apr 2005 07:30:38 +0000
>From [EMAIL PROTECTED] Tue Apr 12 00:30:38 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DLFr4-0003IS-00; Tue, 12 Apr 2005 00:30:38 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DLFeC-0002k6-00; Tue, 12 Apr 2005 03:17:20 -0400
From: Matthias Urlichs <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#302692: fixed in gnupg2 1.9.15-6
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 12 Apr 2005 03:17:20 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
X-CrossAssassin-Score: 2
Source: gnupg2
Source-Version: 1.9.15-6
We believe that the bug you reported is fixed in the latest version of
gnupg2, which is due to be installed in the Debian FTP archive:
gnupg-agent_1.9.15-6_i386.deb
to pool/main/g/gnupg2/gnupg-agent_1.9.15-6_i386.deb
gnupg2_1.9.15-6.diff.gz
to pool/main/g/gnupg2/gnupg2_1.9.15-6.diff.gz
gnupg2_1.9.15-6.dsc
to pool/main/g/gnupg2/gnupg2_1.9.15-6.dsc
gnupg2_1.9.15-6_i386.deb
to pool/main/g/gnupg2/gnupg2_1.9.15-6_i386.deb
gpgsm_1.9.15-6_i386.deb
to pool/main/g/gnupg2/gpgsm_1.9.15-6_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Matthias Urlichs <[EMAIL PROTECTED]> (supplier of updated gnupg2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Changed-By: Matthias Urlichs <[EMAIL PROTECTED]>
Date: Thu, 7 Apr 2005 10:13:19 +0200
Version: 1.9.15-6
Distribution: unstable
Source: gnupg2
Urgency: high
Maintainer: Matthias Urlichs <[EMAIL PROTECTED]>
Binary: gnupg-agent gnupg2 gpgsm
Architecture: i386 source
Closes: 302692 303492
Changes:
gnupg2 (1.9.15-6) unstable; urgency=high
.
* Move gpg-protect-tool to the gpgsm package.
Closes: #303492.
High urgency because this renders gpgsm unuseable for some people.
* gpg-agent: Override max-cache-ttl if a higher default is set.
Closes: #302692.
Description:
gpgsm - GNU privacy guard - password agent
gnupg-agent - GNU privacy guard - password agent
gnupg2 - GNU privacy guard - a free PGP replacement
Files:
3d6045e886d4ff1926e704b034aa9256 90372 utils optional
gnupg-agent_1.9.15-6_i386.deb
c291893759fa444f9020099468aa8d44 733230 utils extra gnupg2_1.9.15-6_i386.deb
8be20177ae80eef21fa9e6242dde744e 1855499 utils optional gnupg2_1.9.15-6.diff.gz
12ad81f160e5926c5505eda62ca0a1e6 353320 utils optional gpgsm_1.9.15-6_i386.deb
e079ef09f05cefbedf971189437614bd 842 utils optional gnupg2_1.9.15-6.dsc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFCW3H98+hUANcKr/kRAspGAJ9DQ6S+yDYIxAI5XKdw6wdsDiI6NgCdFX1h
VLGzQJd8SObLXfjFEsMdeOw=
=cBIj
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]